a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers.

Size: px
Start display at page:

Download "a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers."

Transcription

1 CAYUGA COUNTY POLICY MANUAL Section 11 Subject: Electronic messaging and internet 1 Effective Date: 5/25/10; Res Supersedes Policy of: November 28, 2000 Name of Policy: County Computer Hardware-Software I. BACKGROUND: The availability and use of computers in the county has provided many opportunities for the enhancement of productivity. While increased access to information has benefited the county, technology that entails easy access to and the rapid transfer and distribution of sensitive data has the potential to have a damaging effect on the county, our employees, and the public, if not managed properly. II. PURPOSE: The purpose of this order is to establish policy and procedures regarding the use of county computer and electronic messaging systems. Ill. POLICY: It is the policy of Cayuga County that all employees shall abide by the guidelines established for the use of department computers to include applicable department rules and regulations, other department written directives, interface provider regulations, directives, operating instructions, use and dissemination agreements, and all applicable federal and state statutes. IV. DEFINITIONS: DEPARTMENT COMPUTER: Any personal computer, laptop computer, hand-held computer device, wireless computer device, or similar device owned, leased, operated, or maintained by the County of Cayuga. AUTHORIZED USER: Any employee authorized by appropriate authority to utilize County computer(s). TECHNOLOGY OFFICER: The member of this county designated by the County Administrator with the responsibility for managing computers. INFORMATION TECHNOLOGY STAFF: IT Personnel employed by the Cayuga County Information Technology Department or Health and Human Services IT Personnel, or Data Processing Personnel and assigned to technology and network management. UNAUTHORIZED SOFTWARE: Any software that has not been approved by the Information Technology Staff and licensed for use on department computers. This includes any software not required for job related duties. DOWNLOADS: Copies of computer files obtained through removable media (e.g., floppy disk, zip disk, CD ROM) or received from another computer or the internet. 1 This policy does not superceed or impact on General Order No. 452 Computers and Electronic messages issued by Sheriff Dave Gould, effective March 2010; or any amendments to General Order No P age

2 V. PROCEDURE: A. GENERAL USE AND PRIVACY 1. The use of any department computer is authorized for official business only and is considered a privilege subject to revocation. 2. Employees do not maintain any right to privacy when using a department computer and its contents, to include personally owned software. By using a department computer, all employees knowingly and voluntarily consent to electronic monitoring and acknowledge the department's right to conduct such monitoring. The County Administrator reserves the right, without notice, to: a) Access any information composed, created, received, downloaded, retrieved, stored, or sent using department computers. b) Access, for quality control, audit, or internal affairs purposes, any electronic messages generated by members utilizing department computers. c) Require employees to provide passwords to systems or files that have been password protected or encrypted. 3. Accessing or transmitting materials other than for official business that involves indecent, sexually explicit, and/or unprofessional language or images, or that disparages any person, group, or classification of individuals is prohibited. 4. Installation of and access to software of a purely entertainment use (e.g., computer games) is prohibited. B. SECURITY AND CONFIDENTIALITY 1. The use of department computers shall be limited to legitimate County purposes and department communications. 2. All information stored within or accessible by department computers shall be treated as confidential information. This information may only be accessed, disclosed or disposed of in accordance with: 2 P age a) Department policy and procedures, b) The policy, rules, regulations or operating instructions of information provider agencies c) Use and dissemination agreements of information provider agencies. d) Applicable federal and state laws. 3. Only authorized users may use County, department, or State computers. Employees assigned to use a computer will be responsible for maintaining its physical security as well as the integrity and security of data contained therein. Every reasonable precaution available shall be used to safeguard the computer/data (e.g., logging-off terminals when leaving a computer unattended, shielding screens from public view, maintaining password confidentiality). 4. No employee will access or attempt to gain access or allow an unauthorized person to gain access to any computer or any area of a County, department, or State computer or network that he/she is not authorized to access. This includes, but is not limited to, hard drives, network drives, interfaces, removable media,

3 software programs, databases, and mailboxes. 5. Employees viewing any information in County, department, or State computers are responsible for the security and confidentiality of that information. Information and reports viewed in electronic form are considered the same as printed material. All applicable policies and procedures, regulations, use and dissemination agreements, and laws governing the release and disposition of computer information shall be followed. Confidential printed information should be shredded. 6. Confidential, proprietary, or sensitive information may be disseminated only to authorized persons with a need and a right to know and only when there is sufficient assurance that the appropriate security of such information will be maintained. Examples of such information include, but are not limited to: a) Client records including medical records, income/credit information, and identification data. b) Personnel information such as personnel complaints, performance reviews, internal investigations, grievances, disciplinary information, personal employee information, and medical records. c) Internal department memorandums or communications. d) Criminal history information and any other files protected by law (e.g., juvenile delinquency records). e) Confidential informant, intelligence, and identification files. 7. Employees are required to immediately report any potential, suspected, or known breach of department computer security to the County Administrator. C. I. COMPUTER HARDWARE/SOFTWARE POLICY 1. All new computers purchased must have surge protection on electric power, either surge suppressor, or UPS with surge suppressor. 2. Any new computer hardware may not be installed without informing the County Administrator or his/her designee. 3. Computer equipment may not be relocated or reassigned outside the department or between buildings without informing the County Administrator or his/her designee. 4. Internal computer hardware equipment (such as network cards, video cards, hard disks, etc.) may not be moved from one PC to another without authorization from the County Administrator or his/her designee. 5. Computer equipment may not be removed from County property without authorization from the County Administrator or his/her designee (except laptops and notebooks). Employees taking any computer equipment away from County premises (including laptops or notebooks) must have permission from their department head. Any computer equipment taken off County premises may only be used for County related work. 6. All work station PC s are to be shut down at the end of the day, especially during the summer, for protection against power surges from lightning storms, unless remote or network access is necessary after normal business hours. 7. Purchase of Hardware or Services: 3 P age (a) The County Administrator or his/her designee must approve any lease or contract for professional services that relates to computer hardware. This includes design, support or maintenance of computer hardware, networking, Internet, and computer repair services. All hardware purchases must also conform to the County Procurement Policy and guidelines.

4 8. Only licensed versions of application software and/or operating system software are permitted. Bootleg or pirated software is not permitted on county-owned computers at any time. Software not approved by the County Administrator or his/her designee is not permitted on county-owned computers at any time. 9. Duplication of county-owned software through any medium (e.g., CD-Rom writer, diskettes) for personal use or unauthorized distribution is prohibited. 10. Installation and/or use of personal software from home on county-owned computers are prohibited. 11. Adding new screen-savers or inappropriate background screen image on county-owned computers is prohibited. 12. Do not change system settings (Network, Neighborhood, Device Setup, Internet Access Options, Control Panel Regional Settings, etc.) without authorization from County Administrator or his/her designee, except for printers properties. 13. Purchase of New Software and Services: (a) The County Administrator or his/her designee must review and authorize the purchase of any new software for any county-owned computer. (b) County Administrator or his/her designee must approve any lease or contract for professional services that relates to computer software. This includes design, support or maintenance of computer software, operating systems, databases, networking, and web design services. (c) All software purchases must also conform to the County Procurement Policy and guidelines. 14. County Administrator or his/her designee will select and set the types of general-purpose software for use throughout the County government. 15. Confirming sender before opening attachment is recommended. II. DATA INTEGRITY & SECURITY 16. It is the responsibility of all county employees to back up their data stored on their PC on a regular basis. Failure to do so may result in grave consequences for which the County Administrator or his/her designee will assume no responsibility. 17. A current copy of an Anti-Virus software approved by the County Administrator or his/her designee is to be running on each PC and laptop, and is not to be turned off or have its settings changed. 18. CD-ROMs, diskettes, and other media from outside sources are not to be used unless they directly relate to County business and have been checked for viruses. 19. Employees who feel any computer equipment, removable media or devices have been lost or stolen must report loss to the County Administrator immediately. 20. Employees who think their usernames or passwords may have been compromised must report the details to their IT support staff immediately. III. REMOVABLE MEDIA 21. Employees are not permitted to bring anything from outside to connect to a work PC or the County network. This includes the use of floppy disks, CD's. DVD's, thumb drives, external drives of any type, using any type of wireless protocol or devices, web cameras, music players, or any other type of media or storage device. 22. Employees are not permitted to copy, share, or remove County data or software from County property through the use of floppy disks, CDs or DVDs, thumb drives, , FTP transfer, cell phones, or any 4 P age

5 other type of storage device or transfer protocol or software unless it is directly related to and part of their job duties. 23. Employees are not permitted to view, copy, share, disseminate, or remove any client data, records of any kind, or any other type of data or information on County computers, network drives, servers, storage arrays, or any other type of electronic equipment unless it is directly related to and part of their job duties. 24. Employees are not permitted to modify any client data, records of any kind, or any other type of data or information on County computers,, network drives, servers, storage arrays, or any other type of electronic equipment unless it is directly related to and part of their job duties. D. TRAINING AND CERTIFICATION All authorized users shall receive appropriate training regarding the department computer systems they are authorized to use. E. PASSWORDS 1. Access to department computers and networks shall be password controlled. 2. Passwords shall be selected so as they are not easily guessed. Whenever practical, they shall include a combination of letters, numbers, and symbols. 3. It is strongly recommended that passwords should be changed at least once per year. 4. Employees shall not give their passwords on any discernable form (written or verbal) to anyone else except as provided in this directive (e.g., directed by command or computer support personnel for business or maintenance purposes). Written passwords or access codes shall not be left in or near computers. 5. Employees shall not use any password other than their own. 6. Password holders will be held accountable for computer access gained through use of their assigned password. 7. Employees who think their usernames or passwords may have been compromised must report the details to the County Administrator and IT support staff immediately. 8. No employee shall permit an unauthorized person to use the department's computer system. 9. If an employee leaves the department's employment, suspended from duty, absent for a prolonged period of time, or is no longer authorized to access any component of the department's computer system, his supervisor shall notify the County Administrator, who shall direct deactivation of the appropriate password account(s). F. SYSTEM ADMINISTRATION 1. The Information Technology Staff is responsible for the installation, maintenance, support, repair, operation, and security of all department computers. 2. Requests for maintenance, support, or repair shall be directed to the Information Technology Department. 3. Employees may not add or modify hardware or software to department computers, or adjust hardware settings (to include computer systems, printers, scanners, modems, and monitors) unless specifically authorized by the Information Technology Department. In addition, employees are prohibited from: a) Taking apart or removing external cases. b) Altering system files. c) Uninstalling, removing, or altering agency owned programs. d) Removing system batteries. 5 P age e) Swapping system parts.

6 4. No unauthorized software may be installed on department or County computers. 5. Employees shall observe the copyright and licensing restrictions of all software, documents, images, or sound and only licensed software may be installed on department or County owned computers. Any software for which proof of licensing (i.e., original disks, original manuals, and/or license) cannot be provided is subject to removal by authorized agency personnel. 6. System users shall take the necessary anti-virus precautions before accessing any external media or downloading or copying any file from the Internet. All media and download files are to be checked for viruses; all compressed files are to be checked before and after decompressed. Suspected viruses shall be isolated and reported to the Information Technology Department. 7. Employees shall be responsible for the basic care, maintenance, and operation of department computers to include: a) Following proper power-up and shut down protocol. b) Preventing exposure to food, liquid, or other damaging elements. c) Preventing damage or mistreatment. d) Removing any floppy disk, CD-ROM, or tape that may potentially damage the system. e) Updating and maintaining the integrity of system passwords. f) Following applicable instructions and procedures. g) Notifying the Information Technology Department of any malfunctions or other system anomalies. 8. To avoid breach of security, employees shall log off any department computer or any other computer that has access to the department's computer system whenever they leave their workstation. G. SYSTEM PROTECTION, DATA BACK-UP AND STORAGE, AND AUDIT 1. The Information Technology Department is responsible for the administering the County s anti-virus and system protection program to include: a) Loading and maintaining virus and firewall protection on all department owned personal computers and network drives. b) Timely update of virus definition files. c) Disseminating information regarding the use of utilities which safeguard department computers (e.g., virus scan, firewall software, file backup). d) Isolating detected viruses and system intrusions and minimizing damage. e) Recovery efforts following attacks. 2. The Information Technology Department shall be responsible for establishing and ensuring back-up procedures and for the regular backup of data stored on the County s Network servers. System users are responsible for any data not stored on a network drive. Storage and retention will be in an appropriate and secure manner and where applicable be in compliance with the NYS Records Retention and Disposition Schedule (CO-2). 6 P age

7 H. The following policy shall apply to all users of Official Cayuga County Addresses. An Official Cayuga County Address is or or 1. addresses shall be administered by the Cayuga County Webmaster. Requests for new accounts should be submitted to Information Technologies in writing using the appropriate request form. 2. An Official Cayuga County Address is intended only for official county business and all mail becomes property of Cayuga County. You are expected to keep personal correspondence to a minimum. 3. Using Official Cayuga County for any personal economic gain is not permitted. 3. Users are expected to check their accounts frequently and make provisions to have mail forwarded if they expect to be away for an extended period of time. I. ELECTRONIC MESSAGING 1. Electronic messaging through department owned computers is designed to enhance our efficiency. The use of electronic messaging shall be limited to legitimate County needs and department communications. 2. All messaging that is composed, transmitted, or received via our computer systems is considered to be part of the official records of the department and, as such, is subject to disclosure to other third parties. Consequently, members shall always ensure that information contained in messaging is accurate, appropriate, ethical, and lawful. 3. The following types of electronic messages are specifically prohibited: a) Sending or posting confidential or sensitive to those not authorized to receive it. b) Sending or posting material that could damage the department's image or reputation. c) Distributing copyrighted materials without the consent of the copyright owner. d) Sending or receiving messages for personal gain or non-department business. e) Sending or posting material that is discriminatory, harassing, or obscene, or for any other purpose that is illegal, against department policy, or not in the best interest of the department. f) Misrepresenting your identity (unless in the performance of an approved duty). g) Any activity that tends to clog the system to include sending or forwarding chain letters, unnecessarily sending messages to a large number of recipients, unnecessarily large attachments, or using excessive storage space on servers. h) Use of the Internet for downloading or uploading streaming audio, radio, video, Internet games or any other type of software, unless specifically related to county work. 7 P age i) Prohibited is viewing or posting messages, replies or any type of announcements to the Internet via message boards, forums, chat rooms, on-line classified, news groups, list

8 serves, or any other type of public web site, unless directly related to employees scope of work and not conflicting with any other communications policy set by the County Chairman or the County Legislature. j) Violation of this Internet policy could result in an employment sanction. 4. In order to limit the resources needed to store electronic messages, the County reserves the right to delete stored messages. Information that needs to be saved should be printed and filed in the appropriate place. J. INTERNET ACCESS 1. The County may at its discretion provide employees with Internet access to and/or information on the World Wide Web or similar data collection technology. Access is provided for department business use only. 2. Internet access shall be done in a professional manner in compliance with all applicable laws and department policies, and as authorized by the employee s Department Head or supervisor. The Internet shall not be used for any illegal, improper, unprofessional, illicit, or non-official business. 3. The Internet is a valuable tool and members may use the Internet in the performance of their duties to enhance their effectiveness. Users should not be "surfing the net" during work hours. 4. Transmission of confidential and sensitive information via the Internet is prohibited. 5. All files downloaded from the Internet shall be downloaded to the user's local hard drive (C:\) and scanned for viruses prior to being opened on any department computer. No files should be copied to any network drive unless the files have been scanned for viruses. 6. As with all department computer use, the County reserves the right to access and review Internet use on County computers as necessary to ensure that there is no misuse or violation of County policy or any law. The Technology Officer, County Administrator or his/her designee will monitor Internet activity and shall report abuse to the department head or other authority as deemed necessary. 8 P age

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

City of Venice Information Technology Usage Policy

City of Venice Information Technology Usage Policy City of Venice Information Technology Usage Policy The City of Venice considers information technology (IT) resources to be city resources. It shall be the policy of the city to maintain these resources

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007 I. Statement of Policy The Department of Finance and Administration (DFA) makes

More information

Information Technology Acceptable Use Policies and Procedures

Information Technology Acceptable Use Policies and Procedures Information Technology Acceptable Use Policies and Procedures The following Information Technology Acceptable Use Policies and Procedures are to be followed by ALL employees, contractors, vendors, and

More information

Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems

Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically

More information

Wise County Computer Operations Policy

Wise County Computer Operations Policy Wise County Computer Operations Policy Purpose The purpose of this policy is to implement guidelines and policies for the use of the Wise County computer systems and networks and external connections,

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

SUNY College at Oneonta Information Technology Acceptable Use Policy

SUNY College at Oneonta Information Technology Acceptable Use Policy Policy Statement The College s Information Technology resources are intended for the exclusive use of people having a relationship with the College who have been assigned a valid user account. College

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

Introduction. General Use

Introduction. General Use Introduction Dane County provides a variety of technological resources to its employees to improve public service and maximize efficiency. The purpose of this policy is to advise users regarding the use

More information

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together

Authorised Acceptable Use Policy 2015-2016. Groby Community College Achieving Excellence Together Groby Community College Achieving Excellence Together Authorised Acceptable Use Policy 2015-2016 Reviewed: Lee Shellard, ICT Manager: May 2015 Agreed: Leadership & Management Committee: May 2015 Next review:

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

About this Tool Information Security for Residents...

About this Tool Information Security for Residents... About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information

More information

COMPUTER USE POLICY City of Proctor

COMPUTER USE POLICY City of Proctor COMPUTER USE POLICY City of Proctor Purpose This policy serves to protect the security and integrity of the city s electronic communication and information systems by educating employees about appropriate

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

DIOCESE OF DALLAS. Computer Internet Policy

DIOCESE OF DALLAS. Computer Internet Policy DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used

More information

Arkansas Department of Community Correction

Arkansas Department of Community Correction Service with Excellence & Integrity Arkansas Department of Community Correction Two Union National Plaza Building 105 West Capitol, 2 nd Floor Little Rock, Arkansas 72201-5731 (501) 682-9510 Fax: (501)

More information

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy

More information

COMPUTER USE POLICY. 1.0 Purpose and Summary

COMPUTER USE POLICY. 1.0 Purpose and Summary COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS

4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS 4118.35 Personnel POLICY REGARDING EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS AND ELECTRONIC COMMUNICATIONS Computers, computer networks, electronic devices, Internet access, and e-mail are effective

More information

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois.

5. Users of ITS are the persons described above under Policy Application of the diocese of Springfield in Illinois. Diocese of Springfield in Illinois Section I General Statement 1. Information Technology Systems (ITS), when properly used, provide timely communication and technological support to help fulfill the mission

More information

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency

More information

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY

OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY OHIO VALLEY EDUCATIONAL COOPERATIVE TECHNOLOGY ACCEPTABLE USE POLICY 03.13211 Referenced by OVEC Policy Manual and OVEC Employee Handbook Version 2.0.0 2/12/2014 Section headings: 1. Introductory paragraph

More information

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology

More information

Town of Essex Comprehensive Public Records and Technology Policy

Town of Essex Comprehensive Public Records and Technology Policy Town of Essex Comprehensive Public Records and Technology Policy Introduction: Public records and the use of technology are inextricably linked in our modern age. As such, this policy covers both topics,

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

Nondiscrimination. 1 of 10

Nondiscrimination. 1 of 10 Scope This procedure applies to all College District information technology resource users, including but not limited to administrators, faculty, students, staff, Board members, agents, volunteers, vendors,

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance. 1.0 PURPOSE: Internet access to global electronic information sources on the World Wide Web is provided by the City of Battle Creek to assist in obtaining work-related data and technology. The following

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Delaware State University Policy

Delaware State University Policy Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

Grand Rapids Public Schools

Grand Rapids Public Schools 4510-R Computer Network (Cf. 4520) 4510-R Planning and funding for computer networking in the District shall be handled in accord with the District's policy and rules on technology. Supervised Use Teachers

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE 2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes

More information

Sample Policies for Internet Use, Email and Computer Screensavers

Sample Policies for Internet Use, Email and Computer Screensavers Sample Policies for Internet Use, Email and Computer Screensavers In many of its financial management reviews, the Technical Assistance Section has encouraged municipalities to develop and adopt policies

More information

PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL

PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL PINE BLUFF POLICE DEPARTMENT POLICY/PROCEDURES MANUAL SUBJECT: Computer Security CHAPTER: ADMINISTRATION & PERSONNEL ISSUED By: Chief of Police John Howell POLICY NUMBER 118 ISSUE DATE 02/19/2008 EFFECTIVE

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES

District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES District Regulation 2361 - ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES Section: Program Date Created: March, 2007 Date Edited: October, 2014 The school district provides computer equipment,

More information

Beaumont Public Library Computer Usage Policies

Beaumont Public Library Computer Usage Policies Beaumont Public Library Computer Usage Policies Information contained in this document is on internet safety, use guidelines, internet filtering, and wireless internet. The Beaumont Public Library, in

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE POLICY AND PAGE 1 of 7 OCTOBER 25, 2007 Tab Authority Subject Related Policies Corporate Services Information Technology Services Responsible Computing Corporate IT Guiding Principles Policy, Harassment

More information

Appropriate Use Policy Technology & Information

Appropriate Use Policy Technology & Information CLACKAMAS COUNTY EMPLOYMENT POLICY & PRACTICE (EPP) EPP # 59 Implemented: 05/20/10 Clerical Update: Appropriate Use Policy Technology & Information PURPOSE: To establish rules governing use of County information

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information